Cyber Careers
Skills
Terminology 1
Terminology 2
Terminology 3
100

After software is written, it is their job to review the source code and list potential bugs and errors that may pose security threats.

What is Source Code Auditors?

100

To ensure security settings are running smooth and up to standard, a Security Auditor must do this to scan for any activity.

What is Design / Run (Special) Audits ?

100

Google Drive exists in this location.

What is the Cloud?

100

A series of numbers separated by periods that identifies a computer on a network.

What is IP Address?

100

These pieces of code are designed to disrupt, damage, or gain unauthorized access to a computer system.

What is Malware?

200

At a cyber crime scene, Gilbert is tasked with carefully handling evidence of a security breach for law enforcement to determine the cause of the breach.

What is Forensic Expert?

200

Security Managers must be able to do this with a team to enforce and regulate security policies to prevent and solve breaches.

What is Lead / Manage?

200

More than ever, we need to worry more about this due to the transition to the online environment.

What is Cyber Attacks?

200

Spotify, Instagram, and many others on your smartphone is an example of this.

What is Software?

200

A security system implemented onto computer systems to track incoming and outgoing network access.

What is a Firewall?

300

Their job is to simulate cyber attacks on a company's software code to stress test the security systems.

What is Penetration Testers?

300

Forensic experts must have this skill to explain and demonstrate evidences of cyber attacks, especially in a court setting.

What is Strong Speaking Skills?

300

Cybersecurity is a necessary field in today's technological world because it helps prevent hackers from stealing this.

What is Data/Information?

300

Using another person's social security number is an example of this.

What is Identity Theft?

300

A hospital has a separate server containing fake patient information to trick potential hackers.

What is a Honeypot?

400

This professional builds software solutions that will protect crucial information in the database from being leaked.

What is Security Engineer?

400

Cyber Heroes must ensure that these are up-to-date with new threats and new technology.

What is Protocol/Guidelines?

400

Jeff was able steal information to sell on the dark web by disguising himself up as a nurse without identification and talking his way through the receptionist.

What is Social Engineering?

400

These people use their skills ethically.

What is White Hat Hacker?

400

These make up the CIA Triad.

What is Confidentiality, Integrity, and Availability?

500

Joe discusses security measures with many clients and if they are satisfied with his proposal, he must install the necessary protections for a company.

What is Security Consultant?

500

A fundamental to being a Cryptographer is understanding complex calculations involving math and statistics to create this for encryptions and decryptions.

What are Algorithms?

500

Cybersecurity specialists use this hiding technique to protect communications between devices.

What is Encryption?

500

An exploit was found in a program.

What is a Bug / Glitch?

500

Mark is a top cybersecurity employee who has this to see top secret files that normal employees don't have access to.

What is Authorization?